CN1494803A - Encryption of compressed video stream - Google Patents
Encryption of compressed video stream Download PDFInfo
- Publication number
- CN1494803A CN1494803A CNA02805556XA CN02805556A CN1494803A CN 1494803 A CN1494803 A CN 1494803A CN A02805556X A CNA02805556X A CN A02805556XA CN 02805556 A CN02805556 A CN 02805556A CN 1494803 A CN1494803 A CN 1494803A
- Authority
- CN
- China
- Prior art keywords
- encryption
- data piece
- frame
- algorithm
- independent data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
- H04N21/23476—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
Abstract
The purpose of the invention is to enable receipt of a compressed data stream through the use of powerful algorithms on terminals having weak cryptographic capabilities. The invention makes use of a method for encrypting a compressed video stream comprising independent data blocks and differential data blocks which consists in encrypting the independent data blocks and the differential data blocks according to a different level of encryption.
Description
Technical field
The present invention relates to a method, this method is used to encrypt a compressing video frequency flow, in decrypting process, can't lose resource when improving level of security especially.
Background technology
Video compression algorithm is based on such fact, that is: usually between the piece image and the ensuing width of cloth difference less and to show the needed amount of information of these differences be to reduce compared with needed the containing much information of performance entire image.Observe and find, to another width of cloth image, a large amount of information does not change even is rediscovered in a different slightly zone from piece image.
This principle is applied in the form of MPEG-2, MPEG-3 or Quick Time type.
According to these algorithms, first width of cloth image---is called with reference to figure---by complete transmission, and the analysis to the subsequent figures picture is implemented so that determine and transmission difference therebetween then.According to mpeg standard, we distinguish the frame (I frame) of complete transmission, the variance data of MV (motion vector) type and the variance data of DFD (difference between motion vector model and true picture) type.
According to known solution, these data are encrypted according to the algorithm that and the level of security wanted adapt subsequently.
In order to keep compatible in transmission and processing procedure, each group is all encrypted separately, and in other words, the attribute of each frame still as seen, and is only meaningful encrypted.
Along with the development of storage device, enciphered data---such as a film---to be sent to subscriber unit be very common thing.
In case file is stored in subscriber unit, the third party can spend the required time to try to decipher these data to the greatest extent.
For fear of this risk, the first step is to improve the level of security of file, in other words, uses the strong algorithm that has long password.
Although this method is gratifying on level of security, it also shows the inconvenience that need drop into valuable source on decrypting device.
The developing direction of various viewing device is to use data by the unit with low code capacity.This is exactly the example that has the new mobile phone of display screen for instance.To this type of unit, use complicated algorithm in real time and the performance that do not reduce this unit is impossible.
Therefore, use is not suitable for being used to all types of subscriber units by strong algorithm ciphered data piece.
Summary of the invention
Thereby this application aims is to make the more weak terminal of decoding capability can use powerful algorithm.
This purpose is that the encryption method by a compressing video frequency flow realizes that this compressing video frequency flow comprises independent data piece and variance data piece, and described method is encrypted independent data piece and variance data piece according to different encryption levels.
To the independent data piece, we be interpreted as can be not with reference to the information of front and therefrom obtain the information of decompress(ion) signal.Can be complete frame (I frame) for instance.
To the variance data piece, we are interpreted as the information that can obtain the decompress(ion) signal by the signal of using different information correction front wherein.
In fact, this solution can focus on the highest safeguard protection on the requisite information of image decompression.According to this method, first algorithm is applied to the whole frame (I frame) of compressed video signal, and second algorithm is applied to the different information of motion vector type or DFD type.
This difference also can be by using the password of different length to realize according to data type.Like this, whole frame will be encrypted with the password of one 2048 binary digit, and different information then can be encrypted with the password of one 128 binary digit.
According to an embodiment of the invention, different information is not encrypted.
It should be noted, also can use this method based on other information source of difference principle work.This example is exactly the example according to the MP3 format compressed music.
Description of drawings
The present invention is better understood under the help of nonrestrictive accompanying drawing below, wherein:
Fig. 1 has described the compressive flow before the cryptographic operation,
Fig. 2 has represented the compressive flow of encrypted form,
Fig. 3 has represented the compressive flow in the transmission.
Embodiment
In Fig. 1, compressive flow is represented with a series of whole frame (I) and different information (P/B).According to this example, first whole frame I1 back and then is used for rebuilding the frame P/B1-2 from whole frame I1 to the successive frame the whole frame I2.
Similarly, whole frame I2 back and then is used for arriving the continuous difference frame P/B2-3 of whole frame I3.
Then, this data flow according to the type of the frame described in Fig. 2 by the encryption of selectivity.In this drawing, we are that the first password k1 of 2048 binary digits encrypts whole frame I1, I2 and I3 with length.The second password k2---such as long 128 binary digits---is used to encrypt difference frame P/B1-2 and P/B2-3.
The length of password k1 given here and k2 is example as an illustration, and it can be other any length.
According to the present invention, the difference of encrypting quality can realize in the password rank or on employed algorithm rank.So for instance, represented an IDEA (International Data Encryption Algorithm according to the encryption of k1, IDEA) class algorithm has been represented a DES (Data EncryptionStandard, data encryption standard) class algorithm according to the encryption of k2.
In the transmission course of this data flow, whole frame such as Fig. 3 description are at first transmitted.
This characteristic allows receiving element get started being decrypted than the frame of long process time.In case these frames are decrypted, owing to can carry out fast, the processing of difference frame be can be done in real time for the selected algorithm types of difference frame.
According to an embodiment of the invention, to the encryption level of whole frame be first frame according to it---such as frame I1---or the frame of back (I2 and I3) and difference.In fact, for the signal that decompresses from deciphering benefits, we must handle first frame at once, are difference frame then.Here it is why first frame of a frame sequence use one than the whole frame of back decipherment algorithm faster.
This algorithm can be the same with the algorithm that is used for difference frame, also can be another algorithm.
Claims (4)
1. the method for a ciphered compressed video flowing, described compressing video frequency flow comprises independent data piece (I) and variance data piece (P/B), it is characterized in that described method encrypts independent data piece (I) and variance data piece (P/B) according to different encryption levels.
2. method according to claim 1 ciphered compressed video flowing is characterized in that independent data piece (I) with a high-level algorithm for encryption, and variance data piece (P/B) is with a fast decryption algorithm for encryption.
3. method according to claim 1 is characterized in that independent data piece (I) with one or several long password encryption, and variance data stream (P/B) is with one or several short password encryption.
4. one according to the method one of in the claim 1 to 3, it is characterized in that, in the transmission course of compressed signal, independent data piece (I) is by composition sequence, and the encryption level that this method is to encrypt this sequence first data block is different from the encryption level of the subsequent data blocks in the sequence.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CH3442001 | 2001-02-26 | ||
CH20010344/2001 | 2001-02-26 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1494803A true CN1494803A (en) | 2004-05-05 |
CN1220384C CN1220384C (en) | 2005-09-21 |
Family
ID=4506834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB02805556XA Expired - Fee Related CN1220384C (en) | 2001-02-26 | 2002-02-25 | Encryption of compressed video stream |
Country Status (10)
Country | Link |
---|---|
US (1) | US7212636B2 (en) |
EP (1) | EP1374588B1 (en) |
KR (1) | KR100850825B1 (en) |
CN (1) | CN1220384C (en) |
AT (1) | ATE303699T1 (en) |
BR (1) | BRPI0207581B1 (en) |
CA (1) | CA2438599C (en) |
DE (1) | DE60205879T2 (en) |
ES (1) | ES2248516T3 (en) |
WO (1) | WO2002069638A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100505866C (en) * | 2004-10-28 | 2009-06-24 | 武汉大学 | A video information encrypting-decrypting method |
CN1758587B (en) * | 2005-09-06 | 2011-10-26 | 宏碁股份有限公司 | Data processing method |
CN101286837B (en) * | 2008-05-13 | 2012-08-29 | 江苏大学 | Message encryption device and method oriented to storage area network |
CN104734723A (en) * | 2015-03-10 | 2015-06-24 | 中国人民解放军信息工程大学 | Data conversion method based on compression and scrambling |
CN106209896A (en) * | 2016-07-29 | 2016-12-07 | 网宿科技股份有限公司 | Streaming media encryption method based on audio frequency and video form and module |
CN111757062A (en) * | 2020-06-29 | 2020-10-09 | 郑州信大捷安信息技术股份有限公司 | Efficient and safe transmission method and system for video stream |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7224310B2 (en) | 2002-11-20 | 2007-05-29 | Nagravision S.A. | Method and device for the recognition of the origin of encrypted data broadcasting |
WO2004056112A1 (en) * | 2002-12-16 | 2004-07-01 | Koninklijke Philips Electronics N.V. | Method and apparatus to encrypt video data streams |
FR2849307B1 (en) * | 2002-12-24 | 2006-10-27 | Viaccess Sa | METHOD AND SYSTEM FOR SECURING ENLARGED DATA |
US20040193871A1 (en) * | 2003-03-28 | 2004-09-30 | Broadcom Corporation | System and method for transmitting data using selective partial encryption |
US20060269055A1 (en) * | 2005-05-26 | 2006-11-30 | International Business Machines Corporation | Method and apparatus for improving performance and security of DES-CBC encryption algorithm |
KR20090002939A (en) * | 2007-07-05 | 2009-01-09 | 삼성전자주식회사 | A method of transmitting and receiving video data in a digital broadcasting service and an apparatus thereof |
ES2556271T3 (en) | 2008-08-22 | 2016-01-14 | Qualcomm Incorporated | Procedure and apparatus for transmitting and receiving protected data and unprotected data |
US8472625B2 (en) * | 2009-09-16 | 2013-06-25 | Broadcom Corporation | Method and system for protecting 3D video content |
US9066117B2 (en) * | 2012-02-08 | 2015-06-23 | Vixs Systems, Inc | Container agnostic encryption device and methods for use therewith |
US8744078B2 (en) * | 2012-06-05 | 2014-06-03 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
KR102426067B1 (en) | 2014-08-07 | 2022-07-28 | 디빅스, 엘엘씨 | Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0856356A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Encoding device and decoding device |
US5623549A (en) * | 1995-01-30 | 1997-04-22 | Ritter; Terry F. | Cipher mechanisms with fencing and balanced block mixing |
US5805700A (en) * | 1996-10-15 | 1998-09-08 | Intel Corporation | Policy based selective encryption of compressed video data |
US5949884A (en) * | 1996-11-07 | 1999-09-07 | Entrust Technologies, Ltd. | Design principles of the shade cipher |
KR100389902B1 (en) * | 1997-06-23 | 2003-09-22 | 삼성전자주식회사 | Fast block encryption method guaranteeing security for differential cryptanalysis and linear cryptanalysis |
US6185679B1 (en) * | 1998-02-23 | 2001-02-06 | International Business Machines Corporation | Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks |
ES2270494T3 (en) | 1998-09-01 | 2007-04-01 | Irdeto Access B.V. | DATA COMMUNICATION SYSTEM. |
US6490353B1 (en) * | 1998-11-23 | 2002-12-03 | Tan Daniel Tiong Hok | Data encrypting and decrypting apparatus and method |
US6950517B2 (en) * | 2002-07-24 | 2005-09-27 | Qualcomm, Inc. | Efficient encryption and authentication for data processing systems |
US7415109B2 (en) * | 2002-08-23 | 2008-08-19 | Qualcomm Incorporated | Partial encryption and full authentication of message blocks |
-
2002
- 2002-02-25 EP EP02700520A patent/EP1374588B1/en not_active Expired - Lifetime
- 2002-02-25 CA CA2438599A patent/CA2438599C/en not_active Expired - Fee Related
- 2002-02-25 CN CNB02805556XA patent/CN1220384C/en not_active Expired - Fee Related
- 2002-02-25 KR KR1020037010782A patent/KR100850825B1/en active IP Right Grant
- 2002-02-25 US US10/297,431 patent/US7212636B2/en not_active Expired - Fee Related
- 2002-02-25 DE DE60205879T patent/DE60205879T2/en not_active Expired - Lifetime
- 2002-02-25 ES ES02700520T patent/ES2248516T3/en not_active Expired - Lifetime
- 2002-02-25 AT AT02700520T patent/ATE303699T1/en not_active IP Right Cessation
- 2002-02-25 BR BRPI0207581A patent/BRPI0207581B1/en not_active IP Right Cessation
- 2002-02-25 WO PCT/IB2002/000557 patent/WO2002069638A1/en not_active Application Discontinuation
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100505866C (en) * | 2004-10-28 | 2009-06-24 | 武汉大学 | A video information encrypting-decrypting method |
CN1758587B (en) * | 2005-09-06 | 2011-10-26 | 宏碁股份有限公司 | Data processing method |
CN101286837B (en) * | 2008-05-13 | 2012-08-29 | 江苏大学 | Message encryption device and method oriented to storage area network |
CN104734723A (en) * | 2015-03-10 | 2015-06-24 | 中国人民解放军信息工程大学 | Data conversion method based on compression and scrambling |
CN106209896A (en) * | 2016-07-29 | 2016-12-07 | 网宿科技股份有限公司 | Streaming media encryption method based on audio frequency and video form and module |
CN106209896B (en) * | 2016-07-29 | 2020-02-18 | 网宿科技股份有限公司 | Streaming media encryption method and module based on audio and video formats |
CN111757062A (en) * | 2020-06-29 | 2020-10-09 | 郑州信大捷安信息技术股份有限公司 | Efficient and safe transmission method and system for video stream |
Also Published As
Publication number | Publication date |
---|---|
KR100850825B1 (en) | 2008-08-06 |
US7212636B2 (en) | 2007-05-01 |
KR20040011464A (en) | 2004-02-05 |
BRPI0207581B1 (en) | 2016-05-24 |
CA2438599C (en) | 2011-09-20 |
EP1374588A1 (en) | 2004-01-02 |
US20030133571A1 (en) | 2003-07-17 |
ES2248516T3 (en) | 2006-03-16 |
DE60205879T2 (en) | 2006-06-08 |
DE60205879D1 (en) | 2005-10-06 |
WO2002069638A1 (en) | 2002-09-06 |
CN1220384C (en) | 2005-09-21 |
EP1374588B1 (en) | 2005-08-31 |
ATE303699T1 (en) | 2005-09-15 |
CA2438599A1 (en) | 2002-09-06 |
BR0207581A (en) | 2004-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1220384C (en) | Encryption of compressed video stream | |
Long et al. | Separable reversible data hiding and encryption for HEVC video | |
Itier et al. | Recompression of JPEG crypto-compressed images without a key | |
Massoudi et al. | Overview on selective encryption of image and video: challenges and perspectives | |
Lian et al. | A novel image encryption scheme based-on JPEG encoding | |
US8189664B2 (en) | Methods for encrypting and compressing video | |
Kulkarni et al. | Proposed video encryption algorithm v/s other existing algorithms: A comparative study | |
JP2017535123A (en) | Encoder, decoder and method using partial data encryption | |
Seidel et al. | Cryptanalysis of video encryption algorithms | |
Rodrigues et al. | Selective encryption of human skin in JPEG images | |
Soleymani et al. | A survey on principal aspects of secure image transmission | |
Sallam et al. | CABAC-based selective encryption for HEVC using RC6 in different operation modes | |
Barannik et al. | A Method of Scrambling for the System of Cryptocompression of Codograms Service Components | |
Lian et al. | Perceptual cryptography on JPEG2000 compressed images or videos | |
Puteaux et al. | A secret JPEG image sharing method over GF (2 M) galois fields | |
US20060265601A1 (en) | Jpeg2000 syntax-compliant encryption with full scalability | |
EKA NINGSIH et al. | MP4 VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT (LSB) SUBSTITUTION AND ADVANCED ENCRYPTION STANDARD (AES). | |
Choon et al. | Lightweight and cost-effective MPEG video encryption | |
Alhassan et al. | Perceptual video encryption via unit anti-diagonal matrix | |
Hooda et al. | A comprehensive survey of video encryption algorithms | |
Xu et al. | Two-dimensional histogram modification for reversible data hiding in partially encrypted H. 264/AVC videos | |
Yeung et al. | Partial video encryption based on alternative integer transforms | |
Mohamed et al. | Joint Compression-Encryption Technique Based On Arithmetic Coding for JPEG Images | |
Gbaden | A Chaos based image Encryption Scheme using one Dimensional Exponential Logistic Map. | |
Shimizu et al. | Cube-based encryption connected prior to Motion JPEG standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20050921 Termination date: 20190225 |